{"id":362,"date":"2025-10-06T23:36:02","date_gmt":"2025-10-06T23:36:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jmint006\/?p=362"},"modified":"2025-10-06T23:37:55","modified_gmt":"2025-10-06T23:37:55","slug":"cyber-defense-starts-with-you-journal","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jmint006\/2025\/10\/06\/cyber-defense-starts-with-you-journal\/","title":{"rendered":"\u201cCyber Defense Starts with You\u201d Journal #6"},"content":{"rendered":"\n<p>After watching the YouTube video, The Human Firewall: Why Cybersecurity Isn&#8217;t Just a Technical Problem, it becomes clear how convenient and easy it is for a hacker to view your information without having to share your personal information (through phone, WIFI connections, or the use of online credit cards. The video discussed how the speaker visited a conference, and the FBI stated that \u201cAI is escalating cybercrime, and we (the cyber defense team) are just trying to keep up.\u201d I have always thought that AI can be two things: very helpful or very dangerous, and to be honest, a little scary. The things that people can do when using AI can ruin another person&#8217;s life. The speaker provided important advice on keeping your information safe and protected, which includes thinking ahead and having a plan in place for disruptions before they occur, as this could potentially cost the organization millions of dollars. Apparently, many companies do not think ahead. I believe any business that uses technology, even the latest technology, should still be protected. I think that to ensure the organization is up to date with its awareness, a prevention training should be conducted every two months. This video was very informative and helpful for learning about the human firewall.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After watching the YouTube video, The Human Firewall: Why Cybersecurity Isn&#8217;t Just a Technical Problem, it becomes clear how convenient and easy it is for a hacker to view your information without having to share your personal information (through phone, WIFI connections, or the use of online credit cards. The video discussed how the speaker&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jmint006\/2025\/10\/06\/cyber-defense-starts-with-you-journal\/\">Read More<\/a><\/div>\n","protected":false},"author":31155,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts\/362"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/users\/31155"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/comments?post=362"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts\/362\/revisions"}],"predecessor-version":[{"id":365,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts\/362\/revisions\/365"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/media?parent=362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/categories?post=362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/tags?post=362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}